The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A typical example for shared motion is shaking of two devices which are held together in one hand. Deriving a shared secret (key) from shared motion, e.g. for device pairing, is an obvious application for this. Only the keys need to be exchanged between the peers and neither the...
The possibility of secure communication used only to be the privilege of professional services and systems which could afford to allocate enormous funds for the development of specialized communication devices. Nowadays, through the popularization of the open-source development model, significant reduction of development costs was thus enabled, together with maintaining a high level of security. Such...
Real-time operating systems play important roles in developing many of today’s embedded systems. Majority of these embedded systems have intense interactions with the environment through I/O devices, namely sensors and actuators. Interrupts are often used by the operating systems to handle these interactions through executing the corresponding interrupt service routines (ISRs). ISRs are usually executed...
Whole-body (WB) PET parametric imaging has recently become clinically feasible with the introduction of multi-bed dynamic acquisition protocols, benefiting from the latest technologies in clinical PET scanners. Currently, Time-of-Flight (TOF) capabilities of modern PET systems allow for more accurate localization of the annihilation position along the line of response (LOR). As a result, TOF can prevent...
Malware today often uses very sophisticated methods to avoid being detected on the victim machine itself. However, hiding the actual communication between an attacker and his malware is often neglected by malware authors. As a consequence, intermediate hosts inspecting the incoming and outgoing traffic of the victim host may be able to detect the infection. In this paper, we describe a proof-of-concept...
The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) is widely used to solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded...
To provide better performance for different applications, multiple ISP subscriptions will be helpful. However, the existing gateways for multiple ISP connections do not meet performance requirements for both UDP and TCP applications. In this paper, we explain how we have designed and implemented a gateway to meet such requirements. Our gateway provides subflow control policies which solve conflicts...
Most of the network monitor systems use a user-level network capture library. The user-level library incurs a large overhead and provides inaccurate and insufficient information for self-adaptive networks. For these reasons, we develop a lightweight built-in network monitor running at Linux kernel level for self-adaptive IoT devices.
Openvswitch is the most popular software implementation of an OpenFlow switch on the Linux system. Its current implementation includes a kernel module and a user space daemon. To connect with an OpenFlow controller and handle all the command message traffic, Openvswitch needs to transfer control messages between the user space and the kernel space of the Linux system frequently. When the amount of...
Time division multiple access (TDMA) based channel access is one of the most widely used mechanisms in Mobile Ad hoc Networks (MANET) with its efficient channel access and collision free transmissions at its core. In this paper, we propose a unique TDMA frame format designed specifically for supporting two-way voice communication in bandwidth efficient manner. The proposed algorithm uses single radio...
For ubiquitous network services, wireless local-area network (WLAN) systems using plural access-points (APs) are often deployed in a network field. Then, a host may detect signals from multiple APs that are interfered. This redundancy can cause performance degradations and energy wastes if a small number of hosts participates the network. On the other hand, if many hosts participate there, the number...
The future of communication resides in Internet of Things, which is certainly the most sought after technology today. The applications of IoT are diverse, and range from ordinary voice recognition to critical space programmes. Recently, a lot of efforts have been made to design operating systems for IoT devices because neither traditional Windows/Unix, nor the existing Real Time Operating Systems...
Checkpoint-restart is a predominantly used reactive fault-tolerance mechanism for applications running on HPC systems. While there are innumerable studies in literature that have analyzed, and optimized for, the performance and scalability of a variety of check pointing protocols, not much research has been done from an energy or power perspective. The limited number of studies conducted along this...
Access to information in a timely manner is becoming more and more important in military operations. This also includes exchange of information between different security domains. Traditionally security domains have been physically separated to avoid loss of confidentiality. Information exchange between domains has been limited to specialized solutions or manual intervention. In this paper we present...
Small I/O requests are important for a large number of modern workloads in the data center. Traditionally, storage systems have been able to achieve low I/O rates for small I/O operations because of hard disk drive (HDD) limitations that are capable of about 100–150 IOPS (I/O operations per second) per spindle. Therefore, the host CPU processing capacity and network link throughput have been relatively...
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing. We believe that the missing catalyst is a meta network architecture that welcomes most, if not all, clean-state designs on a level playing field, lowers deployment barriers, and leaves...
Nowadays, there is a rapid increase in usage of the embedded systems in consumer, industrial, automation and commercial applications. Linux being an open source and fastest growing operating system supports many hardware architectures. The flexibility it offers for the developers makes Linux the default choice for many embedded system boards. There is a very high demand for Linux porting onto various...
The research trends in computer and wireless communication networks are growingly facilitated with the emergence of various Network Simulation tools. Network simulation software enables users to model network behavior demonstrating the packet transmission behavior and interaction amongst the nodes. These models are further used to analyze and predict the behavior of a computer network on various devices...
The notion of Software-Defined Networking (SDN) has already been introduced into cloud datacenter networks for provisioning virtual network environment. Network virtualization of today is generally achieved by L2-in-L3 tunneling protocols like VXLAN (Virtual eXtensible LAN) and NVGRE (Network Virtualization using Generic Routing Encapsulation) in public cloud datacenters. Some leading production packages...
This paper presents a new delivery model for IP communication services based on using lightweight Customer Premises Equipment (CPE) that is remotely controlled by virtualized software images running on a provider cloud.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.